02.27.14

Summary: Samsung’s proximity and increasing control of Tizen is another reason to avoid Tizen, not just Samsung

LONG before Samsung was really into Linux there were numerous efforts to bring Linux to mobile. It’s a shame that one of the largest such efforts is now controlled by Intel/Samsung but officially steered by the Linux Foundation, which is funded by those companies that help Microsoft. By far the biggest player, however, remains Android, which is also based on Linux (some journalists don’t seem to know that Android has Linux in it [1] and others overlook the contribution of Alien Dalvik back in MeeGo’s days [2]). There are numerous articles about Samsung’s adoption of Tizen as an important platform [3-5], but none of them offers a critical take on Samsung’s special relationship with Microsoft.

CBS had a lot of coverage regarding the latest Samsung phone [6-8] which increasingly involves the likes of Intel [9]. The coverage in Muktware [10,11] focused on the features and release date, but there too there was no criticism of Samsung, which increasingly imitates the bad side of Apple.

The bottom line is, Samsung has too much control of Tizen and only to a lesser degree of Android. This is not a good thing; Samsung never cared about freedom, instead emphasising DRM and other such negative aspects of technology. This issue merits an open discussion. █

Tizen has a long road ahead in terms of matching Android in apps or popularity. Quite frankly, that happening is very unlikely. Of course, many would have said BlackBerry was unbeatable years ago, so never say never.

With a simple click, the Polaris App Generator software is able to wrap an Android APK and convert it to a Tizen OS executable file. This means developers don’t have to pour additional resources into manually porting their apps.

The long wait for a major Tizen OS device is finally over, and it’s a…smartwatch? At Mobile World Congress in Barcelona this week, Samsung skipped the unveiling of its first Tizen smartphone, and instead rolled out a trio of Tizen-based wrist computers: the Gear 2, Gear Neo, and Gear Fit. Due to ship in April, the devices are lighter and more stylish than Samsung’s Android-based Galaxy Gear.

The much-anticipated Galaxy S5 is finally here! After months of rumors and leaks, Samsung unveiled the successor to the Galaxy S4 at a press conference at Mobile World Conference (MWC) 2014 in Barcelona. Though it’s a minor evolution of the Galaxy S4, the new phone packs a sharp 5.1-inch screen, a faster, 2.5GHz quad-core Snapdragon 800 processor, 2GB of RAM and a 16-megapixel camera. Taking cue from the Samsung Galaxy S4 Active, the smartphone is also waterproof. It features a new fingerprint scanner similar to the iPhone 5S.

We’ve waited for this moment for quite some time, but now the S5 has officially been revealed. Samsung’s latest offering comes with a 5.1″ 1920 x 1080p screen, 2GB of RAM, 16 or 32GB of storage plus the ability to host a Micro SD card. Android 4.4.2 is on board as expected, and it sports a 2.5Ghz quad-core Snapdragon process (not sure of 800, 801 or 805).

Portal 2 is now available to Linux users – in beta form. Valve has recently released a public beta for the latest version of its bestselling sequel, which you can opt-in to via the Portal 2 properties in your Steam Library. Valve is getting pretty keen on this Linux business and welcomes your bug reports via Github.

MegaGlest is a 3D real-time strategy game, completely free and open-source, taking place on a wide range of maps and including seven different factions. MegaGlest is a fork of Glest, which stopped being developed a few years ago.

Zigfrak is a single player space-based action RPG, featuring missions, exploration, and crafting. It is also now DRM free on FireFlower Games, on other stores it uses a one-time activation key, so I hope this version comes to other stores too.

Reven recently announced the team has reached its Kickstarter funding goal, bringing some more awesome 2D platformer goodness to the Linux platform. Varia games also plans on bringing the title to OS X, as well as the Wii U. Monthly updates are planned to be broadcast on the popular gaming video platform, Twitch.tv. A public demo and eta keys should show up in the next few months.

The overview includes only games which are completely free, with a permissive license for both the code and their content. I could not include here games like Urban Terror or Warsow, since their assets are not free, nor Steam games.

Standing for TINT Is Not Tetris, that’s exactly what it is. A terminal-based tetris clone with highscore saving and 9 levels. Among the tetris clones for Linux, TINT is one of my favorites. Use J to move pieces left, L to move them right, K to rotate and SPACE to accelerate. Press Q to quit. On Ubuntu at least, there seems to be a problem when saving highscores due to permissions not allowing it (Error creating /var/games/tint.scores). You can fix it by doing something like this: sudo touch /var/games/tint.scores && sudo chown $USER:$USER /var/games/tint.scores.

Qemu 2.0 is looking to be released on April 4. Ubuntu 14.04 closes on April 10, with release on April 17. How’s that for timing. Currently the qemu package in trusty has hundreds of patches, the majority of which fall into two buckets – old omap3 patches from qemu-linaro, and new aarch64 patches from upstream.

Other Photocrumbs niceties include the ability to add descriptions to each photo (either by entering text into the UserComment EXIF field or by creating an accompanying .php file), and support for basic EXIF info. For each photo, Photocrumbs displays key info like aperture, shutter speed, ISO, and timestamp.

This release is a significant milestone for us as it marks the first release we consider to be production ready. It features a wide variety of improvements to container security, a consistent set of tools, updated documentation and an API with multiple bindings.

Over 60 people contributed their time to this release, making it the best LXC release yet! The result of all that work can be seen used in areas as diverse as individual laptops, cellphones and cloud instances. And we are confident that with LXC 1.0, we will see LXC’s usage expand even more and be used for a lot of new and exciting projects.

Apache Tomcat is an opensource webserver product of Apache Foundation like Apache HTTP server. It is used to deploying Java Servlet and JSP applications. To deploy any application in Tomcat we can simply create a war file and deploy them. For more details about you can visit apache official site http://tomcat.apache.org/ .

It’s been months, and I’m still dealing with a DDOS (distributed denial of service) attack on my server—an attack that I can see is coming from China, but there’s not really much I can do about it other than try to tweak firewall settings and so on.

Summary: Secret deals and racketeering techniques elude journalists who are passing allegations as ‘facts’, damaging Linux for the most part

SOMETHING fascinating has been happening in the corporate press over the past few years (starting 2010 with HTC). Unlike with the Novell deal (Microsoft SUSE), when it comes to Android the press seems eager to push the “Android is not free” line. Even some pro-FOSS journalists are doing it, only to face opposition. To quote Pogson’s response to one of them: “I don’t often disagree with SJVN but I think his argument that M$ makes $billions from Android/Linux taxes is extreme. If that were happening, there would be some mention of it in M$’s SEC filings.”

Not only is this not happening based on any concrete evidence; the sources which make these claims are quoting some arbitrary analysts with Microsoft connections or Microsoft boosters/lobbyists who cite such people. Trace it all back to the source and it looks like make believe. It’s like a big lie that needs to die, at least until or unless there’s some kind of proof.

Those of us who see journalists perpetuating and spreading the claims that Microsoft makes billions of dollars from Android should respond to the authors/editors by equating them with so-called ‘conspiracy theories’ who throw around unsubstantiated claims. Microsoft has long been manufacturing dirt and lies, only to be caught some time later, after much damage had been done to the subject of libel. Bribed journalists often play a role in such big lies and nobody demonstrates this as well as the Gates Foundation, which is basically a lobbying and investment shell (masquerading as a charity and bribing the press to maintain this illusion). As Jamie Love put it yesterday: “The few reporters that have written about the trade disputes over cancer patents are not on the Gates payroll. [...] Gates has effectively aligned itself with Merck, Novartis and others, against cancer patients. Sometimes, discretely. [...] WHO is quite cautious on the IPR issues these days, because of fears that Gates will complain. [...] Gates Foundation funding of health news reporters, most health NGOs, contributes to lack of criticism of Obama’s actions on cancer patents” (we wrote about cancer patents before, including their impact on death). Remember that Gates received got a huge amount of money last year from this patent profiteering (gains of about 15 billion dollars). He is still all about patents and monopolies. Gates is also investing in patent trolls and collaborating with the world’s biggest patent troll, which he helped create (the head of this trolling entity is one of Bill Gates’ best friends).

As Joe Mullin put it the other day, frivolous litigation with baseless patents is still worthwhile in the US because the plaintiff never assumes the financial burden of the cases. This works well for trolls such as Microsoft, Bill Gates, and the world’s biggest patent troll which he created. It’s deterrence against defence. As Mullin puts it: “The American judicial system has long held to a general principle that each party in a dispute should pay for its own legal fees, win or lose.”

Microsoft is a patent troll based on its actions, signing secret deals using useless patents, knowing that the burden of a legal case would be put on the victim. As long as this kind of system prevails the corruption of the industry and the media (which cannot gain access to these secret deals) will continue.

Microsoft corruption is an immensely powerful phenomenon which now transcends the software industry. One way to address this issue is to work on changing the patent system (which is hard). █

Mike Lofgren’s exceptional essay, “Anatomy of the Deep State,” delivers the roadmap that bewildered Americans need to navigate the past year’s glut of news about mass surveillance. The term “Deep State” aptly conveys how the private security industry has melded with government. It is soldered by plutocracy, perpetual war, reduction of industrial capacity, US exceptionalism and political malfunction. Lofgren is a credible and welcome interpreter of how these factors combine to exert control over us.

Deutsche Telekom plans to launch an app for smartphones that encrypts voice and text messages. The move is the latest step taken by the firm to address users’ privacy concerns following NSA whistleblower, Edward Snowden’s, mass surveillance revelations.

The cloud-based app will encrypt each voice or text exchange between two devices using a unique code, Reuters cites Deutsche Telekom as saying in a statement.

WhatsApp was already bad before Facebook acquired it. But at least now people woke up and are considering alternatives. Yes, this move could have come earlier, but I do welcome the new opportunity: its the first time wide spread encryption actually has a chance in the consumer market. So for most of the people out there the question is more “which alternative should I use” instead of “should I use one”. Right now I do not have the faintest idea what alternative will make the break through – but you could say I am well prepare.

Many commentators following the NSA scandals have been eagerly awaiting the recommendations of the US government task force on the matter, and the proposed reforms to be implemented by President Obama to bring the spy agency under control. If you’re interested in this kind of thing, you can watch the president’s recent speech and nod your head approvingly when he talks about the “tradition of limited government” in the United States, and the constitutional limits his government is at pains to respect. Oh, and just for good measure, while you’re listening to this magnificent oration being replayed to you on YouTube, the NSA will be recording your internet browser history, or possibly even hacking your computer.[1] If you decide to click on the “like” or “dislike” buttons at the bottom of the video, that little nugget of political information can be added to their “metadata” archives, along with the rest of your internet activities. In fact, in the 42 minutes it will take you to watch the president’s speech, the NSA will have hoovered up around 40 million records of internet browsing from around the world.[2] Perhaps yours will be among them.

The main problem with hacktivism “remains with the legislators and officials who fail to see things in analog-equivalent terms,” said Piratpartiet’s Rick Falkvinge. “If getting documents to a reporter was OK in the pre-Internet age as part of our checks and balances on power, then it has to be OK in the digital age, too.” Yet “many powerholders freak out at the slightest occurrence of pentesting.”

Perhaps one of the most striking and revelatory aspects about the latest NSA surveillance news story, this one published Sunday by The Bild am Sonntag newspaper in Germany, was that it was not based on leaked documents from the now famous NSA whistleblower Edward Snowden.

What the paper reported, based on information provided by a “high-ranking NSA employee in Germany,” was that the U.S. spy agency—after being outed for spying on German Chancellor Angela Merkel—responded to an order to refrain from spying directly on Merkel’s phone by intensifying its monitoring of other high-level officals her government.

During a day-long conference at the Georgetown University Law Center, Dr. George Ellard, the inspector general for the National Security Agency, spoke for the first time about the disclosures made by former NSA contractor Edward Snowden.

When the NSA sweeps up your telephone data, including who you call, when you call them, and for how long, they don’t keep that data forever. The deal with the secret FISA courts gives them five years to hold on to your data, then they’re supposed to delete it.

Yes, 100 per cent: I’m a target. If the FBI tried to get a warrant on my computer based on the fact that I have worked with Snowden documents then the odds they would get it are 100 per cent. And I do take pains. But look at that NSA Tailored Access Operations catalogue from 2008. The fact that I’m running an air-gapped computer is irrelevant – if the NSA wanted in, they would get in.

The reason they are not is because they know that if it ever got out that they attacked US journalists, the shit-storm would be ginormous. I do think the NSA tries to follow the law, and the Attorney General has said [the US government] is not going to prosecute the journalists.

Tom Engelhardt has a lengthy article in TomDispatch that explores the depth of the US national security state. He argues that people are deluded to think that whistle-blowers such as Edward Snowden, Chelsea (Bradley) Manning, and Julian Assange revealed the depth of spying in the US.

The NSA has taken snooping to a new level with the news that the Orwellian big brother of the U.S. Government wants to create a “national license-plate recognition database.”

The Department of Homeland Security Immigration and Customs Enforcement agency (ICE) stressed that the database “could only be accessed in conjunction with ongoing criminal investigations or to locate wanted individuals.”

A lawsuit challenging domestic military spying against citizens engaged in antiwar activism and acts of civil disobedience obtained a public record that further confirms the United States Army was involved in targeting “leftists” or “anarchists” as domestic terrorists in 2007.

Also, according to a “Democracy Now!” interview, one of the activists was pressured by the military officer, who infiltrated groups in the state of Washington, to become more interested in guns and to even publish an article in a magazine that was written from the perspective of hijackers behind the 9/11 attacks.

If you thought NSA snooping was bad, you ain’t seen nothing yet: online criminals have also been watching and should soon be able to copy the agency’s invasive surveillance tactics, according to security guru Bruce Schneier.

Richard Clarke, the first cybersecurity czar at the White House, said Tuesday that “terrible” internal cybersecurity at the National Security Agency was responsible for allowing former NSA contractor Edward Snowden to download about 1.5 million classified documents.

The number of attacks exploiting a yet-to-be-patched vulnerability in Internet Explorer has increased dramatically over the past few days, indicating the exploit is no longer used just in targeted attacks against particular groups of people.

The vulnerability affects Internet Explorer 9 and 10 and was publicly revealed on Feb. 13 by researchers from security firm FireEye who found an exploit for the flaw being served from the Veterans of Foreign Wars (VFW) website. Security researchers from security firm Websense later reported that the same vulnerability was being exploited from the compromised website of French aerospace association GIFAS (Groupement des Industries Francaises Aeronautiques et Spatiales).

Was the National Security Agency exploiting two just-discovered security flaws to hack into the iPhones and Apple computers of certain targets? Some skeptics are saying there is cause to be concerned about recent coincidences regarding the NSA and Apple.

The Obama administration has been presented with four wide-ranging options on how to reform the National Security Agency’s (NSA) phone data collection program — including doing away it altogether — according to a report from the Wall Street Journal. Citing officials close to the matter, the Journal reports that intelligence officials presented the options ahead of the March 28th deadline that President Barack Obama set forth in a speech about NSA reform earlier this year.

Jaffer, who argued the Supreme Court case on behalf of the plaintiffs, said that questions remain about how the Justice Department arrived at its initial policy. “They don’t actually explain how they could have concluded that it was lawful to conceal the role that the FISA Amendments Act played in criminal investigations,” he said. “They haven’t explained their prior policy or how they arrived at it.’’

After long debate over whether to give the NSA Data Center a $6 million tax break on its electric bill, the Senate passed a bill Tuesday that keeps the authority to tax the center intact, but makes it unlikely the state will ever actually levy the tax.

The slogan “Amazon and you’re done” may have just taken on a whole new meaning — at least for enemies of the state.

Privacy advocates and media watchdogs are challenging a contract between Amazon.com Inc. (NASDAQ:AMZN) and the U.S. Central Intelligence Agency, calling it a potentially “ominous” convergence of mass surveillance and perpetual war.

In the months since Edward Snowden revealed the nature and extent of the spying that the National Security Agency (NSA) has been perpetrating upon Americans and foreigners, some of the NSA’s most troublesome behavior has not been a part of the public debate.

This behavior constitutes the government’s assaults on the American legal system. Those assaults have been conducted thus far on two fronts, one of which is aimed at lawyers who represent foreign entities here in America, and the other is aimed at lawyers who represent criminal defendants against whom evidence has been obtained unlawfully and presented in court untruthfully.

Mike’s coverage of leaks showing the NSA and GCHQ using the internet to “manipulate, deceive and destroy reputations” (as reported by Glenn Greenwald at firstlook.org) hit the front page of Reddit yesterday, generating lots of traffic for Techdirt. This traffic truly should have gone to firstlook.org, but never made it there. A look at the top comments on our coverage show why…

The Internet has provided a forum for average people throughout the world to disseminate, share and debate information unattenuated by gatekeepers in the mainstream media and their politically connected friends. New media outlets like Personal Liberty Digest™ have, for years, been warning readers that the well-connected and ruling elite, displeased by this newfound proletariat freedom, have been prolific in attempts to undermine and marginalize information provided by any media outlet unwilling to obey the same unspoken rules that govern the content choices of major media outlets.

A draft resolution sponsored by the Green group of MEPs and enjoying cross-party support will be debated today (26 February) and voted on tomorrow between 12 and 2pm. The resolution condemns the extrajudicial killings resulting from drone strikes, notes an increase in strikes in recent years in places like Pakistan, Yemen and Somalia, and demands full transparency from those Member States that possess drones technology (including the UK).

Human Rights Watch issued a 28-page report investigating the attack in December 2013 on a wedding procession in Yemen. The attack killed at least 12 men and wounded at least 15 others including the bride.

President Obama should be justly haunted by the slaughter of innocents, especially the ones he has personally condemned to death on untested evidence. But it’s hard to imagine him actually being haunted by any of his lethal failures, perhaps least of all by innocents condemned by the mere turning down of his imperial thumb in these or any other circumstances. The Nobel Peace Prize winner hardly sounds haunted when he’s quoted saying, “Turns out I’m really good at killing people. Didn’t know that was gonna be a strong suit of mine.”

On Feb. 10, mass media were embroiled with an intense debate. The debate was about the United States government’s possible drone strike on a U.S. citizen who lives abroad. The target is not just an ordinary U.S. citizen, but a terrorist affiliated with al-Qaeda who happens to hold a U.S. citizenship due to his original place of birth.

My question is: Why would the government even discuss conducting such an extreme measure? Why wouldn’t they just send some UDT/NAVY SEAL teams to capture him and bring him to American soil for judicial proceedings? Under what authority and right can the government of the United States attempt to kill an American citizen by bombing without a trial or judicial review, ignoring fundamental human rights, not to mention the Fourth, Fifth and Fourteenth Amendments? What happened to “due process” and “right in judicial proceedings?” There are so many questions to be answered, and I would like to narrate several points mentioned from a CNN debate, and past statements of government officials.

On my way to work one morning this week, I was listening to Fox News on Sirius. Bill Hemmer was interviewing Ralph Peters, a retired lieutenant colonel. The two were complaining the Defense Department was proposing cuts to our troop levels. Currently, they said, our army has 520K members, but now defense is proposing cutting it “about a 100K down to 440K-450K.” They then stated how Turkey will have a bigger army than us.

I knew this was untrue. When I got to work and looked up the numbers, I found that Turkey has 450K active duty and 378K reserves. We have 1.4 million active and 850K reserves. The report was beyond misleading as it was comparing just our Army to Turkey’s full force. I could say we have a smaller force than Cambodia if I only counted our Coast Guard. This wasn’t misleading, it was outright deceitful.

We also spend more than the next 10 countries combined in our military. And sorry, but I don’t think one Turkish soldier is equal to an American soldier. We have the best jets, tanks, ships, carriers, soldiers, seamen, airmen, and let’s not forget the Marines.

[...]

On a different note, but one rarely discussed: Do we think the Iraq War, Afghanistan War, Gitmo and drones make us more safe or are terrorist organizations using these as propaganda to recruit more terrorists?

Lisa Hajjar, a sociologist from University of California, Santa Barbara, presented a lecture Feb. 24 discussing her research about the military commission trial at Guantanamo Bay for the men responsible for the 9/11 terrorist attacks.

“Let’s Go to Guantanamo! An On-the-Ground Perspective on the 9/11 Trial” was an in-detail discussion of 9/11 accountability, the issue of secret prisons and CIA torture.

In an op-ed piece in the online Wall Street Journal on Wednesday night, Rove, once President George W. Bush’s deputy chief of staff, said it would be too difficult for Congress to get National Security Adviser Susan Rice to testify under oath — and he blasted her expressed lack of regret Sunday for having said at the time that the siege was a result of protests against an offensive video denigrating Islam.

The award-winning journalist Max Blumenthal is exactly right to suggest, as he does in his recent AlterNet piece, that the U.S. has ties to Nazi and fascist protesters in Ukraine. The CIA agrees with him, and so did George Bush Sr. The only difference in their appraisal is the use of the term Neo-Nazi , rather than Nazi. It is just too hard for anyone to fathom that large communities of World War II Nazis not only survived, but have thrived and been protected all these years in Lviv (a city and provincial district in western Ukraine), the USA, and Canada.

American neocons helped destabilize Ukraine and engineer the overthrow of its elected government, a “regime change” on Russia’s western border. But the coup – and the neo-Nazi militias at the forefront – also reveal divisions within the Obama administration, reports Robert Parry.

The Washington-paid schemers are now reaping their just reward as they sit in craven silence while neo-nazi Muzychko wielding an Ak-47 challenges government officials to their face: “I dare you take my gun!”

Edward Snowden ripped the blinds off the surveillance state last summer with his leak of top-secret National Security Agency documents, forcing a national conversation about spying in the post-9/11 era. However, there’s still no concrete proof that America’s elite intelligence units are analyzing most Americans’ computer and telephone activity — even though they can.

Los Angeles and Southern California police, by contrast, are expanding their use of surveillance technology such as intelligent video analytics, digital biometric identification and military-pedigree software for analyzing and predicting crime. Information on the identity and movements of millions of Southern California residents is being collected and tracked.

As has been widely reported (BBC, Daily Mail, Guardian, Telegraph) the Court of Appeal has approved the use of “whole life tariffs” for murderers, seemingly contradicting the European Court of Human Rights. But as the reporting seems to miss some of subtleties of the judgment it is worth a closer look.